Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
21-11-2024 20:18
Static task
static1
Behavioral task
behavioral1
Sample
MATERIAL TAKE OFF - GASKETS AND BOLTS P 5721025 00 001 12036 L003.exe
Resource
win7-20240903-en
General
-
Target
MATERIAL TAKE OFF - GASKETS AND BOLTS P 5721025 00 001 12036 L003.exe
-
Size
531KB
-
MD5
4665816f4565fe8486cebe90d442fac3
-
SHA1
7f35fa7d52f7de5831b7c67b6252eb89bdf9ae13
-
SHA256
2273d198e458cede0e587d1c4d253a1853dee5e267659691f1758d2a87e50d77
-
SHA512
7f9e0bda85bc0169bb6bb376bedd5bcb6fe08d040352a90a5fd5b4cbd2093449e12a3b80fab689a6685e3ecbe0b5941e10aee89d3f5c47d4d38ad8a3b9409366
-
SSDEEP
12288:aQQFxzHeqxqhgLygM0MABlg/7SKpjKLiYriw5dRYKUeG9T:abf7IOLJrYKUX9T
Malware Config
Extracted
xloader
2.5
m3ci
424964.com
ocean-breath-retreat.com
icidedansdehors.art
wrochtthurl.quest
6455gfg.top
dgfipmailservice.online
banjofarmenica.com
dkcazin.com
jobs-fp.com
karens-kornerr.com
parmaesq.com
nuevochile.net
inputsquad.com
consultacedula-sep.digital
taogoubao.net
gimmesolar.com
bluelacedefense.com
grandagent.club
warqatalzawaj.com
getvirbelanow.com
omnifichub.com
rjtherealest.com
hqpzchmo.xyz
pearl-street-art.com
dudukrumah.com
resetmybutton.info
dinodao.xyz
payment-securecard.com
gorjessbyjessicaservice.website
edayispeove.com
glorian34.com
moviezwaphd.red
bxqiche.com
associate-cien.com
coparivan.quest
buyseneca.com
del-directory.xyz
thedarkhuntressexperience.com
trevaleaf.com
kwsi.online
2552111.com
highpacts.com
queenslandspirits.com
magazinhaberlerim.com
radialodge.com
packgames.store
sterre.one
tkspoboys.com
datashen.com
xn--4gqyn781iuoq.xyz
breadnbutterflies.com
intotheground.net
tenlog043.xyz
bendingwillowbirth.com
lavellwesley.com
aumpatho.com
fdklflkdioerklfdke.store
nxscrapbook.com
dan-is-a-ghey-retard.com
retailzoohub.com
pause-beautystore.com
accentpavementmaintenance.com
brittsballers.com
indev-mobility.info
bravobug.net
Signatures
-
Xloader family
-
Xloader payload 3 IoCs
resource yara_rule behavioral2/memory/3588-12-0x0000000000400000-0x0000000000429000-memory.dmp xloader behavioral2/memory/3588-17-0x0000000000400000-0x0000000000429000-memory.dmp xloader behavioral2/memory/4008-23-0x0000000000690000-0x00000000006B9000-memory.dmp xloader -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 4468 set thread context of 3588 4468 MATERIAL TAKE OFF - GASKETS AND BOLTS P 5721025 00 001 12036 L003.exe 95 PID 3588 set thread context of 3444 3588 RegSvcs.exe 56 PID 4008 set thread context of 3444 4008 cmd.exe 56 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MATERIAL TAKE OFF - GASKETS AND BOLTS P 5721025 00 001 12036 L003.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: EnumeratesProcesses 52 IoCs
pid Process 3588 RegSvcs.exe 3588 RegSvcs.exe 3588 RegSvcs.exe 3588 RegSvcs.exe 4008 cmd.exe 4008 cmd.exe 4008 cmd.exe 4008 cmd.exe 4008 cmd.exe 4008 cmd.exe 4008 cmd.exe 4008 cmd.exe 4008 cmd.exe 4008 cmd.exe 4008 cmd.exe 4008 cmd.exe 4008 cmd.exe 4008 cmd.exe 4008 cmd.exe 4008 cmd.exe 4008 cmd.exe 4008 cmd.exe 4008 cmd.exe 4008 cmd.exe 4008 cmd.exe 4008 cmd.exe 4008 cmd.exe 4008 cmd.exe 4008 cmd.exe 4008 cmd.exe 4008 cmd.exe 4008 cmd.exe 4008 cmd.exe 4008 cmd.exe 4008 cmd.exe 4008 cmd.exe 4008 cmd.exe 4008 cmd.exe 4008 cmd.exe 4008 cmd.exe 4008 cmd.exe 4008 cmd.exe 4008 cmd.exe 4008 cmd.exe 4008 cmd.exe 4008 cmd.exe 4008 cmd.exe 4008 cmd.exe 4008 cmd.exe 4008 cmd.exe 4008 cmd.exe 4008 cmd.exe -
Suspicious behavior: MapViewOfSection 5 IoCs
pid Process 3588 RegSvcs.exe 3588 RegSvcs.exe 3588 RegSvcs.exe 4008 cmd.exe 4008 cmd.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 4468 MATERIAL TAKE OFF - GASKETS AND BOLTS P 5721025 00 001 12036 L003.exe Token: SeDebugPrivilege 3588 RegSvcs.exe Token: SeDebugPrivilege 4008 cmd.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 4468 wrote to memory of 3588 4468 MATERIAL TAKE OFF - GASKETS AND BOLTS P 5721025 00 001 12036 L003.exe 95 PID 4468 wrote to memory of 3588 4468 MATERIAL TAKE OFF - GASKETS AND BOLTS P 5721025 00 001 12036 L003.exe 95 PID 4468 wrote to memory of 3588 4468 MATERIAL TAKE OFF - GASKETS AND BOLTS P 5721025 00 001 12036 L003.exe 95 PID 4468 wrote to memory of 3588 4468 MATERIAL TAKE OFF - GASKETS AND BOLTS P 5721025 00 001 12036 L003.exe 95 PID 4468 wrote to memory of 3588 4468 MATERIAL TAKE OFF - GASKETS AND BOLTS P 5721025 00 001 12036 L003.exe 95 PID 4468 wrote to memory of 3588 4468 MATERIAL TAKE OFF - GASKETS AND BOLTS P 5721025 00 001 12036 L003.exe 95 PID 3444 wrote to memory of 4008 3444 Explorer.EXE 100 PID 3444 wrote to memory of 4008 3444 Explorer.EXE 100 PID 3444 wrote to memory of 4008 3444 Explorer.EXE 100 PID 4008 wrote to memory of 4864 4008 cmd.exe 103 PID 4008 wrote to memory of 4864 4008 cmd.exe 103 PID 4008 wrote to memory of 4864 4008 cmd.exe 103
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
PID:3444 -
C:\Users\Admin\AppData\Local\Temp\MATERIAL TAKE OFF - GASKETS AND BOLTS P 5721025 00 001 12036 L003.exe"C:\Users\Admin\AppData\Local\Temp\MATERIAL TAKE OFF - GASKETS AND BOLTS P 5721025 00 001 12036 L003.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4468 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"{path}"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:3588
-
-
-
C:\Windows\SysWOW64\autochk.exe"C:\Windows\SysWOW64\autochk.exe"2⤵PID:2032
-
-
C:\Windows\SysWOW64\autochk.exe"C:\Windows\SysWOW64\autochk.exe"2⤵PID:2008
-
-
C:\Windows\SysWOW64\autochk.exe"C:\Windows\SysWOW64\autochk.exe"2⤵PID:4108
-
-
C:\Windows\SysWOW64\autochk.exe"C:\Windows\SysWOW64\autochk.exe"2⤵PID:2056
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\SysWOW64\cmd.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4008 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"3⤵
- System Location Discovery: System Language Discovery
PID:4864
-
-